Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Cybersecurity

A Field Guide to Insider Threats and Some Advice on How to Neutralize Them

by Jenna Sindle
April 2, 2019
in Cybersecurity
Reading Time: 4 mins read
A A
insider threats
Share on FacebookShare on Twitter

Year after year cybersecurity threat reports reveal that—despite our greatest fears—the most serious cyber risks come not from dangerous hackers or state-based cyber espionage, but from insider threats. That’s right, the most serious cybersecurity risks come from our own colleagues, partners, contractors and team members.

While no one should minimize the damage that hackers and state-affiliated agents can do to the federal government, the likelihood our trusted partners expose our data and systems to unacceptable risk with significant ramifications is high. The truth is, as much as you enjoy working with many of your colleagues, some of their behaviors may put your agency’s sensitive data at risk.

 

According to Verizon’s Insider Threat Report there are five insider types who could introduce serious cyber risks into your agency:

  1. The Careless Worker who misuses assets. Employees or partners who misappropriate resources, break acceptable use policies, mishandle data, install unauthorized applications and use unapproved workarounds; their actions are inappropriate as opposed to malicious, many of which fall within the world of Shadow IT (i.e., outside of IT knowledge and management).
  2. The Inside Agent who steals information on behalf of outsiders. Insiders recruited, solicited or bribed by external parties to exfiltrate data.
  3. The Disgruntled Employee who destroys property. Insiders who seek to harm their organization via destruction of data or disruption of operations.
  4. The Malicious Insider who steals for personal gain.  Actors with access to agency assets who use existing privileges to access information for personal gain.
  5. The Feckless Third Party who accidentally compromises security. Business partners who compromise security through negligence, misuse, or malicious access to or use of an asset.

According to John Grim, Verizon Threat Research Advisory Center, Investigative Response Team, identifying an insider threat is as much about observing human behavior as it is about watching sensors and responding to alerts. “Indicators of risky insider behavior can include factors such as attempts to access information outside of normal job functions, working late hours for no required work reason, or concealing foreign contacts, travels or financial connections,” shared Grim. While no single behavior or activity, or even two or three, is definitively indicative of an insider threat, it’s important to pay attention to patterns or changes in behavior. And in particular, if this behavior can be correlated to data or alerts from devices that are monitoring and logging activity and devices and your agency’s network.

The good news is that even though you might be feeling uneasy after reading this so far, you and your agency aren’t powerless against insider threats. In fact, it’s quite likely that your agency already has many of the tools you need at your disposal. But now you should create or enhance your agency’s cyber action plans to better prepare for insider threats.

If you’re ready to get started on the plan and build your countermeasures, click on the button below. When you do, you’ll be guided through most up-to-date frameworks, best practices, and strategies to counter each insider, who intentionally, or accidentally, will put vital citizen data and mission critical information at risk.

Neutralize Insider Threats Now

 

Tags: Accidental InsiderCyber Risk ManagementInsider Security ThreatInsider ThreatVerizon FederalVerizon Threat Report

RELATED POSTS

Cyber Risk Management
Cybersecurity

Advancing Cyber Risk Management Efforts for Government

November 20, 2020
Deception as a Service, the Next Tool to Add to Your Cyber Arsenal
Cybersecurity

Deception as a Service, the Next Tool to Add to Your Cyber Arsenal

November 6, 2019
Securing the Digital Supply Chain: An Essential Part of a Robust Security Strategy for Federal Agencies
Cybersecurity

Securing the Digital Supply Chain: An Essential Part of a Robust Security Strategy for Federal Agencies

October 1, 2019

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    5353 shares
    Share 2141 Tweet 1338
  • Customer and Industry Partnerships Are Helping Deliver 5G Solutions to Federal Agencies

    102 shares
    Share 41 Tweet 26
  • For the Army to Reach Modernization Goals, a Tactical Data Fabric is Crucial

    40 shares
    Share 16 Tweet 10
  • Design Secure Application Software That Transforms Government Agencies

    11 shares
    Share 4 Tweet 3
  • 2022 Government Investigations Technology Guide Discusses Nine Factors Investigators Should Consider in Technology Solutions

    12 shares
    Share 5 Tweet 3

CONNECT WITH US

MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2021 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Digital Transformation
    • Cybersecurity
    • Hybrid Work
  • Contact Us